SlideShare une entreprise Scribd logo
1  sur  33
VIRTUAL
PRIVATE
NETWORK




PREPARED BY:
Jigar B Navadiya
(D11CE144)
VIRTUAL PRIVATE NETWORK
 Definition
           and introductory notes
     VPN is the network which uses open
 distributed infrastructure of the internet
 to transmit data between corporate sites.
NEED FOR DEVELOPING VPN
 Remote  employees interested to access
  database of corporations.
 Corporate sites developing new relations.
 Increasing growth of the corporation.
VPN RESOLVES THE
PROBLEM
 Itprovides flexibility and scalability
 Cost advantage.
 Makes free from maintenance and training.
WORKING OF VPN
 STEP1…

 STEP2…

 STEP3…
 STEP4…
WORKING-STEP1 (cont…)
 The remote user dials into their local ISP and logs
 into the ISP’s network as usual.




                                            BACK
WORKING-STEP2 (cont…)
 When  connectivity to the
 corporate network is
 desired, the user
 initiates a tunnel request
 to the destination
 Security server




                      BACK
WORKING-STEP3 (cont…)
   The user then sends
    data    through    the
    tunnel which encrypted
    by the VPN software
    before being sent over
    the ISP connection




                     BACK
WORKING-STEP4 (cont…)
 Thedestination Security server receives
 the encrypted data and decrypts.
TYPES OF VPN
 VLL-Virtual   leased lines.
 VPRN-virtual   private routed network.
 VPDN-virtual   private dial-up network.
 VPLS-virtual   private LAN segments.
 Intranet   VPN.
 Extranet   VPN.
 Remote   access VPN.
Virtual Private Network


 VIRTUAL LEASED LINES
 Point to point link
  between two CPE
 IP tunnel between
  2 ISP edge
  routers.
 Frames are relayed
  between IP tunnels.
Virtual Private Network

   VIRTUAL PRIVATE ROUTED
   NETWORK
 Emulation of multisite
  WAN using internet.
 Packet forwarding at
  network layer.
 VPRN specific
  forwarding table at
  ISP routers that
  forwards the traffic.
VIRTUAL PRIVATE DIAL-UP
NETWORK
 On demand tunnel between remote user and
  corporate sites.
 There are possible 2 tunnels.

1… compulsory tunnel.
2… voluntary tunnel.
Virtual Private Network


COMPULSORY TUNNEL
   In this scenario L2TP
    Access Contractor (LAC)
    acting as a dial or
    network access server
    extends a PPP session
    across a backbone using
    L2TP to a remote L2TP
    Network Server (LNS).
    The       operation     of
    initiating the PPP session
    to the LAC is transparent
    to the user.
                 BACK
Virtual Private Network


VOLUNTARY TUNNEL
                Voluntary tunnel refers
                to the case where an
                individual host connects
                to a remote site using a
                tunnel originating on the
                host, with no involvement
                from intermediate
                network nodes. Tunnel
                mechanism chosen can be
                IPSec or L2TP.
VIRTUAL PRIVATE LAN
SEGMENTS
                 A Virtual Private
                  LAN Segment
                  (VPLS) is the
                  emulation of a LAN
                  segment using
                  internet facilities.
INTRANET VPN
                The branch office
                scenario securely
                connects two trusted
                intranets within the
                organization.
                Routers or firewalls
                acting as gateways for
                the office with vpn
                capabilities can be
                used to protect the
                corporate traffic.
EXTRANET VPN
 Inthis scenario multiple supplier intranets that need
 to access a common corporate network over the
 Internet. Each supplier is allowed access to only a
 limited set of destinations within the corporate
 network.
REMOTE ACCESS VPN
A remote user wants to be able to communicate securely
 and cost-effectively to his corporate intranet. This can
 be done by use of an VPN IPSec enabled remote client
 and firewall (or gateway).
VPN PROTOCOLS
 1. PPTP (Point-to-point tunneling
  protocol)
 2.   IPsec (IP security).
 3.   L2TP (layer2 transmission protocol).
LAYER2 TRANSMISSION
PROTOCOL


 What is actually the layer two transmission
 protocol ???



 NEXT
POINT TO POINT
TUNNELING PROTOCOL
 Introduction   to PPTP.
 How   actually PPTP works ???
 Security   provided by PPTP.
 Advantages   of PPTP.
 Disadvantages   of PPTP.



 BACK
INTERNET PROTOCOL
SECURITY
 Introduction   to IP security.
 Features   of IP security.
 Types   of IPsec protocols.
 Types   of modes used in IPsec.



 BACK
SECURITY OF VPN

 Hardware   solution
 Remote   access control.
CERTAIN H/W AND S/W
SPECIFICATIONS…
  Desktop software client for each remote
     user
 Dedicated hardware such as a VPN
  Concentrator or Secure
 PIX Firewall
 Dedicated VPN server for dial-up services
 NAS (Network Access Server) used by
  service provider for
 remote user VPN access
Virtual Private Network


VPN CONCENTRATOR
 Itincorporates the
 most advanced
 encryption and
 authentication
 techniques for
 Remote access
 VPN.
Virtual Private Network


VPN-OPTIMIZED ROUTER
 VPN-optimized
 routers provide
 scalability, routing,
 security and quality
 of service.
Virtual Private Network


PIX FIREWALL
 Firewallcombines
 dynamic network
 address
 translation, proxy
 server, packet
 filtration, firewall
 and VPN
 capabilities in a
 single piece of
 hardware.
Virtual Private Network


VPN/VOIP Application
ADVANTAGES OF VPN


 Cost saving.
 Reduces the long distance charges of
  electronic transactions.
 Concrete security.
DISADVANTAGES OF VPN
VPNs require an in-depth understanding of public network security
 issues and taking proper precautions in VPN deployment.


 The availability and performance of an organization's wide-area
 VPN (over the Internet in particular) depends on factors largely
 outside of their control.


 VPN technologies from different vendors may not work well
 together due to immature standards.
CONCLUSION

 From this we can conclude that VPN
 provides a very safe , secure and cost-
 effective communication infrastructure.
Virtual Private Network




THANKING YOU !!!

Contenu connexe

Tendances

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network mainKanika Gupta
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)sonalikasingh15
 
Virtual private network
Virtual private network Virtual private network
Virtual private network Parth Akbari
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRicha Singh
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)Chandan Jha
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkOsp Dev
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private NetworkShubhayu Roy
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private NetworkPeter R. Egli
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Muhammad Usman
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)Devolutions
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkHASHIR RAZA
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 

Tendances (20)

Virtual Private Network main
Virtual Private Network mainVirtual Private Network main
Virtual Private Network main
 
Virtual private network(vpn)
Virtual private network(vpn)Virtual private network(vpn)
Virtual private network(vpn)
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Vpn
VpnVpn
Vpn
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Types of VPN
Types of VPNTypes of VPN
Types of VPN
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
Vpn
VpnVpn
Vpn
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 

En vedette

Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...Joseph Brunner
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8VISHNU N
 
CCNA ppt Day 9
CCNA ppt Day 9CCNA ppt Day 9
CCNA ppt Day 9VISHNU N
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection pptDasarathi Dash
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkSowmia Sathyan
 

En vedette (8)

Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
Affirmed Systems SSD Storage Area Network Appliance architecture for trading ...
 
CCNA ppt Day 8
CCNA ppt Day 8CCNA ppt Day 8
CCNA ppt Day 8
 
CCNA ppt Day 9
CCNA ppt Day 9CCNA ppt Day 9
CCNA ppt Day 9
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similaire à Vpn_NJ ppt

VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALASaikiran Panjala
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private NetworksDivam Goyal
 
Virtual private network
Virtual private networkVirtual private network
Virtual private networkAyano Midakso
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPNNikhil Kumar
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET Journal
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxearleanp
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual NetworksNicole Gomez
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).Debasis Chowdhury
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaDarshana Viduranga
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Murniana Shazwen
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Murniana Shazwen
 

Similaire à Vpn_NJ ppt (20)

V P N
V P NV P N
V P N
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn rsvp
Vpn rsvpVpn rsvp
Vpn rsvp
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Virtual private network
Virtual private networkVirtual private network
Virtual private network
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
IRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private NetworksIRJET- A Survey of Working on Virtual Private Networks
IRJET- A Survey of Working on Virtual Private Networks
 
Describe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docxDescribe the major types of VPNs and technologies- protocols- and serv.docx
Describe the major types of VPNs and technologies- protocols- and serv.docx
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Lan Virtual Networks
Lan Virtual NetworksLan Virtual Networks
Lan Virtual Networks
 
Virtual Private Network (VPN).
Virtual Private Network (VPN).Virtual Private Network (VPN).
Virtual Private Network (VPN).
 
4 vpn s
4 vpn s4 vpn s
4 vpn s
 
Vpn
Vpn Vpn
Vpn
 
Virtual private networks by darshana viduranga
Virtual private networks by darshana vidurangaVirtual private networks by darshana viduranga
Virtual private networks by darshana viduranga
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
 
Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)Transport mode virtual private network(vpn)
Transport mode virtual private network(vpn)
 
Virtual private networks
Virtual private networks Virtual private networks
Virtual private networks
 

Dernier

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxJanEmmanBrigoli
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 

Dernier (20)

Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptxINCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
INCLUSIVE EDUCATION PRACTICES FOR TEACHERS AND TRAINERS.pptx
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Millenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptxMillenials and Fillennials (Ethical Challenge and Responses).pptx
Millenials and Fillennials (Ethical Challenge and Responses).pptx
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 

Vpn_NJ ppt

  • 2. VIRTUAL PRIVATE NETWORK  Definition and introductory notes VPN is the network which uses open distributed infrastructure of the internet to transmit data between corporate sites.
  • 3. NEED FOR DEVELOPING VPN  Remote employees interested to access database of corporations.  Corporate sites developing new relations.  Increasing growth of the corporation.
  • 4. VPN RESOLVES THE PROBLEM  Itprovides flexibility and scalability  Cost advantage.  Makes free from maintenance and training.
  • 5. WORKING OF VPN  STEP1…  STEP2…  STEP3…  STEP4…
  • 6. WORKING-STEP1 (cont…)  The remote user dials into their local ISP and logs into the ISP’s network as usual. BACK
  • 7. WORKING-STEP2 (cont…)  When connectivity to the corporate network is desired, the user initiates a tunnel request to the destination Security server BACK
  • 8. WORKING-STEP3 (cont…)  The user then sends data through the tunnel which encrypted by the VPN software before being sent over the ISP connection BACK
  • 9. WORKING-STEP4 (cont…)  Thedestination Security server receives the encrypted data and decrypts.
  • 10. TYPES OF VPN  VLL-Virtual leased lines.  VPRN-virtual private routed network.  VPDN-virtual private dial-up network.  VPLS-virtual private LAN segments.  Intranet VPN.  Extranet VPN.  Remote access VPN.
  • 11. Virtual Private Network VIRTUAL LEASED LINES  Point to point link between two CPE  IP tunnel between 2 ISP edge routers.  Frames are relayed between IP tunnels.
  • 12. Virtual Private Network VIRTUAL PRIVATE ROUTED NETWORK  Emulation of multisite WAN using internet.  Packet forwarding at network layer.  VPRN specific forwarding table at ISP routers that forwards the traffic.
  • 13. VIRTUAL PRIVATE DIAL-UP NETWORK  On demand tunnel between remote user and corporate sites.  There are possible 2 tunnels. 1… compulsory tunnel. 2… voluntary tunnel.
  • 14. Virtual Private Network COMPULSORY TUNNEL  In this scenario L2TP Access Contractor (LAC) acting as a dial or network access server extends a PPP session across a backbone using L2TP to a remote L2TP Network Server (LNS). The operation of initiating the PPP session to the LAC is transparent to the user. BACK
  • 15. Virtual Private Network VOLUNTARY TUNNEL  Voluntary tunnel refers to the case where an individual host connects to a remote site using a tunnel originating on the host, with no involvement from intermediate network nodes. Tunnel mechanism chosen can be IPSec or L2TP.
  • 16. VIRTUAL PRIVATE LAN SEGMENTS A Virtual Private LAN Segment (VPLS) is the emulation of a LAN segment using internet facilities.
  • 17. INTRANET VPN  The branch office scenario securely connects two trusted intranets within the organization.  Routers or firewalls acting as gateways for the office with vpn capabilities can be used to protect the corporate traffic.
  • 18. EXTRANET VPN  Inthis scenario multiple supplier intranets that need to access a common corporate network over the Internet. Each supplier is allowed access to only a limited set of destinations within the corporate network.
  • 19. REMOTE ACCESS VPN A remote user wants to be able to communicate securely and cost-effectively to his corporate intranet. This can be done by use of an VPN IPSec enabled remote client and firewall (or gateway).
  • 20. VPN PROTOCOLS  1. PPTP (Point-to-point tunneling protocol)  2. IPsec (IP security).  3. L2TP (layer2 transmission protocol).
  • 21. LAYER2 TRANSMISSION PROTOCOL  What is actually the layer two transmission protocol ??? NEXT
  • 22. POINT TO POINT TUNNELING PROTOCOL  Introduction to PPTP.  How actually PPTP works ???  Security provided by PPTP.  Advantages of PPTP.  Disadvantages of PPTP. BACK
  • 23. INTERNET PROTOCOL SECURITY  Introduction to IP security.  Features of IP security.  Types of IPsec protocols.  Types of modes used in IPsec. BACK
  • 24. SECURITY OF VPN  Hardware solution  Remote access control.
  • 25. CERTAIN H/W AND S/W SPECIFICATIONS…  Desktop software client for each remote user  Dedicated hardware such as a VPN Concentrator or Secure  PIX Firewall  Dedicated VPN server for dial-up services  NAS (Network Access Server) used by service provider for  remote user VPN access
  • 26. Virtual Private Network VPN CONCENTRATOR  Itincorporates the most advanced encryption and authentication techniques for Remote access VPN.
  • 27. Virtual Private Network VPN-OPTIMIZED ROUTER  VPN-optimized routers provide scalability, routing, security and quality of service.
  • 28. Virtual Private Network PIX FIREWALL  Firewallcombines dynamic network address translation, proxy server, packet filtration, firewall and VPN capabilities in a single piece of hardware.
  • 30. ADVANTAGES OF VPN  Cost saving.  Reduces the long distance charges of electronic transactions.  Concrete security.
  • 31. DISADVANTAGES OF VPN VPNs require an in-depth understanding of public network security issues and taking proper precautions in VPN deployment. The availability and performance of an organization's wide-area VPN (over the Internet in particular) depends on factors largely outside of their control. VPN technologies from different vendors may not work well together due to immature standards.
  • 32. CONCLUSION  From this we can conclude that VPN provides a very safe , secure and cost- effective communication infrastructure.